期刊文献+
共找到41篇文章
< 1 2 3 >
每页显示 20 50 100
Exploring users' within-site navigation behavior:A case study based on clickstream data 被引量:1
1
作者 Tingting JIANG Yu CHI Wenrui JIA 《Chinese Journal of Library and Information Science》 2014年第4期63-76,共14页
Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a... Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior. 展开更多
关键词 Web navigation User behavior Clickstream data analysis Metrics Resale apartment website
下载PDF
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
2
作者 Moona Kanwal Najeed AKhan Aftab A.Khan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2419-2440,共22页
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest... The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater. 展开更多
关键词 User intent CLUSTER user profile online search information sharing user behavior search reasons
下载PDF
Database Search Behaviors: Insight from a Survey of Information Retrieval Practices
3
作者 Babita Trivedi Brijender Dahiya +2 位作者 Anjali Maan Rajesh Giri Vinod Prasad 《Intelligent Information Management》 2024年第5期195-218,共24页
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego... This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns. 展开更多
关键词 Information Retrieval Database Search User behavior Patterns
下载PDF
Free Riding Inhibition Mechanism Based on User Behavior in P2P File-Sharing System 被引量:2
4
作者 Zhang Yu Bai Yanping Hao Ying 《China Communications》 SCIE CSCD 2012年第12期36-45,共10页
In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user b... In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems. 展开更多
关键词 free riding user behavior FILE-SHARING white-washing
下载PDF
User Behaviors Analysis in Website Identification Registration 被引量:1
5
作者 甘曈 林福宏 +2 位作者 陈常嘉 郭宇春 郑毅 《China Communications》 SCIE CSCD 2013年第3期76-81,共6页
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S... Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords. 展开更多
关键词 user behaviors website identifi- cation COMPLEXITY CORRELATION PREFERENCE
下载PDF
A New Behavior-Assisted Semantic Recognition Method for Smart Home 被引量:1
6
作者 Weijin Jiang Xiaoliang Liu +3 位作者 Xingbao Liu Yang Wang Sijian Lv Fang Ye 《China Communications》 SCIE CSCD 2020年第6期26-36,共11页
In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic rec... In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic recognition to construct the user’s basic behavior model.This method is usually restricted by environmental factors,the way these models are built makes it impossible for them to dynamically match the services that might be provided in the user environment.To solve this problem,this paper proposes a Semantic behavior assistance(Semantic behavior assistance,SBA).By joining the semantic model on the intelligent gateway,building an SA model,in this way,a logical Internet networks for smart home is established.At the same time,a behavior assistant method based on SBA model is proposed,among them,the user environment-related entities,sensors,devices,and user-related knowledge models exist in the logical interconnection network of the SH system through the semantic model.In this paper,the data simulation experiment is carried out on the method.The experimental results show that the SBA model is better than the knowledge-based pre-defined model. 展开更多
关键词 smart home(SH) semantic behavior assistance(SBA) user behavior intention behavior assisted method
下载PDF
Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics 被引量:1
7
作者 Abdullah Alshehri Nayeem Khan +1 位作者 Ali Alowayr Mohammed Yahya Alghamdi 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1679-1689,共11页
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities ... This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities at such a network.The represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users.Thus,the model can recognize frequencies of regular behavior to profile the user manner in the network.The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular behavior.The importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the network.Typically detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including users.Therefore,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workflow.In contrast,the irregular patterns can trigger an alert for a potential cyber-attack.The framework has been fully described where the evaluation metrics have also been introduced.The experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM 1.The paper has been concluded with pro-viding the potential directions for future improvements. 展开更多
关键词 CYBERSECURITY deep learning machine learning user behavior analytics
下载PDF
Interaction of activity involvement and recreational location selection behavior in Lowland City:A case study of public parks in Saga City,Japan
8
作者 IAMTRAKUL Pawinee TEKNOMO Kardi +1 位作者 GE Jian HOKAO Kazunori 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第8期900-906,共7页
Public parks provide many benefits to the community as the representatives of green area. The allocation of public places plays an extremely important role in the daily lives of inhabitants especially for recreational... Public parks provide many benefits to the community as the representatives of green area. The allocation of public places plays an extremely important role in the daily lives of inhabitants especially for recreational use that could enhance the quality of life of residents in the vicinity. To understand park users’ behavior is one of the most important prerequisites for as-sessing the participation in public service from the park users’ point of view. The pattern of park utilization on location and activity selection are important elements in behavioral study, while the public parks topograph may also influence the typical user’s be-havior. Questionnaire survey on park utilization was used to investigate the interaction between activity involvement and recrea-tional location with the use of linear discriminant analysis (LDA) model. The study found that public park users’ behavior is influenced not only by social characteristics but also by the recreational activities and their specific location characteristics. We found that about 45 percent of park visitors are local residents living within a radius of 3 km preferred travel to parks near their residential area. This implies that location selection behavior is correlated with travel distance, travel time and travel cost. Visit frequencies and on site expenditures reflect the recreation behavior for different type of activities. The overall information can be usefully applied by decision makers to launch appropriate public policy in consistence with the useful results of this study. 展开更多
关键词 Public park Park users behavior ACTIVITY Park location
下载PDF
User Behavior Traffic Analysis Using a Simplified Memory-Prediction Framework
9
作者 Rahmat Budiarto Ahmad A.Alqarni +3 位作者 Mohammed YAlzahrani Muhammad Fermi Pasha Mohamed FazilMohamed Firdhous Deris Stiawan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2679-2698,共20页
As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents cause... As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software(malware)in real-time.Failing to do so may cause a serious loss of reputation as well as business.At the same time,modern network traffic has dynamic patterns,high complexity,and large volumes that make it more difficult to detect malware early.The ability to learn tasks sequentially is crucial to the development of artificial intelligence.Existing neurogenetic computation models with deep-learning techniques are able to detect complex patterns;however,the models have limitations,including catastrophic forgetfulness,and require intensive computational resources.As defense systems using deep-learning models require more time to learn new traffic patterns,they cannot perform fully online(on-the-fly)learning.Hence,an intelligent attack/malware detection system with on-the-fly learning capability is required.For this paper,a memory-prediction framework was adopted,and a simplified single cell assembled sequential hierarchical memory(s.SCASHM)model instead of the hierarchical temporal memory(HTM)model is proposed to speed up learning convergence to achieve onthe-fly learning.The s.SCASHM consists of a Single Neuronal Cell(SNC)model and a simplified Sequential Hierarchical Superset(SHS)platform.The s.SCASHMis implemented as the prediction engine of a user behavior analysis tool to detect insider attacks/anomalies.The experimental results show that the proposed memory model can predict users’traffic behavior with accuracy level ranging from 72%to 83%while performing on-the-fly learning. 展开更多
关键词 Machine learning memory prediction framework insider attacks user behavior analytics
下载PDF
User Behavior Path Analysis Based on Sales Data
10
作者 Wangdong Jiang Dongling Zhang +3 位作者 Yapeng Peng Guang Sun Ying Cao Jing Li Hunan 《Journal of New Media》 2020年第2期79-90,共12页
With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex... With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex.Users’actual demand for resources on the network application platform is closely related to their historical behavior records.Therefore,it is very important to analyze the user behavior path conversion rate.Therefore,this paper analyses and studies user behavior path based on sales data.Through analyzing the user quality of the website as well as the user’s repurchase rate,repurchase rate and retention rate in the website,we can get some user habits and use the data to guide the website optimization. 展开更多
关键词 User behavior Path Analysis VISUALIZATION conversion rate
下载PDF
A Study on the Impacting Path Mechanism of User Behavior Habits for Tourism Social Website
11
作者 GUO Ying-zhi DONG Kun +1 位作者 XU Ning-ning WANG Qiu-lin 《Journal of Tourism and Hospitality Management》 2021年第1期1-13,共13页
Along with the development of socialized media and self-help tourism,tourism industry has been going into tourism social times.Based on technology acceptance model,use and gratifications approach,and weighted and calc... Along with the development of socialized media and self-help tourism,tourism industry has been going into tourism social times.Based on technology acceptance model,use and gratifications approach,and weighted and calculated needs theory,this study explored the impact of perceived popularity,perceived characteristics,and perceived need on the use of tourism social network site and being a member of it.This study also discussed the interaction of perceived popularity,perceived characteristics,and perceived need.The findings of this paper could be used to help the management operator pay attention to strengthen the function of tourism social network site in order to provide better information for users and satisfied the needs of users. 展开更多
关键词 social media times tourism social website behavior habit of user weighted and calculated needs
下载PDF
Factors influencing knowledge contribution:An empirical investigation of social networking website users
12
作者 Shengli DENG Ting ZHOU Min ZHANG 《Chinese Journal of Library and Information Science》 2012年第4期37-50,共14页
Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which inf... Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities. 展开更多
关键词 Social networking sites(SNS) Network user Knowledge contribution User behavior Influencing factor
下载PDF
Introduction to information seeking behavior—A review of literature and field practice directions
13
作者 Li-Ping KU 《Chinese Journal of Library and Information Science》 2010年第1期65-78,共14页
The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map show... The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map showing the seven most productive coauthors in this field. Based on these seven authors' work, five probable research directions about information seeking behavior are discerned and presented. 展开更多
关键词 Social network analysis Library and information science database Information seeking behavior User behavior
下载PDF
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
14
作者 Yuting Tan Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期463-473,共11页
As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ... As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis. 展开更多
关键词 Social Media User behavior Analysis Sentiment Analysis Data Mining Machine Learning User Profiling CYBERSECURITY behavioral Insights Personality Prediction
下载PDF
Subtle role of latency for information diffusion in online social networks 被引量:4
15
作者 熊菲 王夕萌 程军军 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第10期587-595,共9页
Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of lat... Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks. 展开更多
关键词 information diffusion node latency user behavior complex networks
下载PDF
Bidirectional Clone Node Model of Optimizing Performance of Structured P2P Overlay Network 被引量:1
16
作者 Zhang Yu Hao Ying +1 位作者 Ye Xinxin Li Yongzhen 《China Communications》 SCIE CSCD 2012年第4期123-129,共7页
In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A B... In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system. 展开更多
关键词 structured P2P user behavior clone node protocol maintenance cost
下载PDF
An empirical study on continuance intention of mobile reading 被引量:2
17
作者 Chunmei GAN Diyu XIAO 《Chinese Journal of Library and Information Science》 2015年第2期69-82,共14页
Purpose: This study aims to explore factors affecting continuance intention of mobile reading. Design/methodology/approach: Drawing on the unified theory of acceptance and use of technology (UTAUT), and integratin... Purpose: This study aims to explore factors affecting continuance intention of mobile reading. Design/methodology/approach: Drawing on the unified theory of acceptance and use of technology (UTAUT), and integrating perceived enjoyment, we put forward a theoretical research model of factors affecting continuance intention of mobile reading. Using 186 valid data collected through a questionnaire survey, we conducted data analysis with the partial least squares structural equation modeling (PLS-SEM). Findings: The results show that performance expectancy, effort expectancy, social influence and perceived enjoyment all have positive impacts on continuance intention. Among them, perceived enjoyment has the most significant effect on continuance intention, followed by performance expectancy. In addition, effort expectancy significantly influences perceived enjoyment. Contrary to our expectation, facilitating conditions have no impact on continuance intention. Practical implications: This study could help mobile data service providers to foster users' continuous usage of mobile reading. Research limitations: This study focused only on the effect of perceived enjoyment as an internal motivation on continuance intention of mobile reading, and other possible factors were not considered. Also, continuance intention may be different from the actual behavior. Furthermore, data of student users was collected from one university in China, and was cross-sectional, while working samples were not considered. Originality value: This study considers the effects of both external and internal motivation on continuance intention of mobile reading. The results highlight the role of perceived enjoyment in building users' continuance intention of mobile reading. 展开更多
关键词 Mobile reading Unified theory of acceptance and use of technology (UTAUT) Perceived enjoyment Continuance intention Mobile services User behavior
下载PDF
Machine Learning-based Stable P2P IPTV Overlay
18
作者 Muhammad Javid Iqbal Ihsan Ullah +3 位作者 Muhammad Ali Atiq Ahmed Waheed Noor Abdul Basit 《Computers, Materials & Continua》 SCIE EI 2022年第6期5381-5397,共17页
Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service providers.Since Internet was not designed for such services during its inception,such a se... Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service providers.Since Internet was not designed for such services during its inception,such a service poses some serious challenges including cost and scalability.Peer-to-Peer(P2P)Internet Protocol Television(IPTV)is an application-level distributed paradigm to offer live video contents.In terms of ease of deployment,it has emerged as a serious alternative to client server,Content Delivery Network(CDN)and IP multicast solutions.Nevertheless,P2P approach has struggled to provide the desired streaming quality due to a number of issues.Stability of peers in a network is one of themajor issues among these.Most of the existing approaches address this issue through older-stable principle.This paper first extensively investigates the older-stable principle to observe its validity in different scenarios.It is observed that the older-stable principle does not hold in several of them.Then,it utilizes machine learning approach to predict the stability of peers.This work evaluates the accuracy of severalmachine learning algorithms over the prediction of stability,where the Gradient Boosting Regressor(GBR)out-performs other algorithms.Finally,this work presents a proof-of-concept simulation to compare the effectiveness of older-stable rule and machine learning-based predictions for the stabilization of the overlay.The results indicate that machine learning-based stability estimation significantly improves the system. 展开更多
关键词 P2P IPTV live video streaming user behavior overlay networks stable peers machine learning
下载PDF
ICS-SVM:A user retweet prediction method for hot topics based on improved SVM
19
作者 Tianji Dai Yunpeng Xiao +2 位作者 Xia Liang Qian Li Tun Li 《Digital Communications and Networks》 SCIE CSCD 2022年第2期186-193,共8页
In social networks,many complex factors affect the prediction of user forwarding behavior.This paper proposes an improved SVM prediction method for user forwarding behavior of hot topics to improve prediction accuracy... In social networks,many complex factors affect the prediction of user forwarding behavior.This paper proposes an improved SVM prediction method for user forwarding behavior of hot topics to improve prediction accuracy.Firstly,we consider that the improved Cuckoo Search algorithm can select the optimal penalty parameters and kernel function parameters to optimize the SVM and thus predict the user's forwarding behavior.Secondly,this paper considers the factors that affect the user forwarding behavior comprehensively from the user's own factors and external factors.Finally,based on the characteristics of the user's forwarding behavior changing over time,the time-slicing method is used to predict the trend of hot topics.Experiments show that the method can accurately predict the user's forwarding behavior and can sense the trend of hot topics. 展开更多
关键词 Cuckoo search algorithm Support vector machine Hot topic User behavior prediction
下载PDF
Impact of Online Community Structure on Information Propagation:Empirical Analysis and Modeling
20
作者 Zhong He Lian-Ren Wu +1 位作者 Xia Chen Ting-Jie Lu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第3期124-128,共5页
Online social networking sites ( OSNS) ,as a popular social media platform,have been developed massively for business and research purposes. In this paper,it investigated the impact of community structure in online so... Online social networking sites ( OSNS) ,as a popular social media platform,have been developed massively for business and research purposes. In this paper,it investigated the impact of community structure in online social network on information propagation. A SI (Susceptible-Infected) model based on community structure was proposed. In the SI model,the heterogeneity of user's active time was taken into account. From the results,it was found that the number of links among communities determines the fraction of infected nodes. With the increase of the number of groups G,however,the fraction of infected nodes remains approximately constant. The simulation results will be of great significance: the information will last relatively short for group networks which have either a small or a large number of groups. The results can be useful for optimizing or controlling information,such as propagating rumors in online social networks. 展开更多
关键词 community structure information propagation user behavior HETEROGENEITY
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部